You are on page 1of 4

Federal Register / Vol. 73, No.

81 / Friday, April 25, 2008 / Notices 22377

prosecuting, enforcing, or carrying out a integrity of this system or other systems their agency’s purchase charge card
statute, rule, regulation, or order, where or programs (whether maintained by program manager or to the finance office
an agency becomes aware of a violation GSA or another agency or entity) that of the agency for which the individual
or potential violation of civil or criminal rely upon the compromised transacts purchases.
law or regulation. information; and (3) the disclosure
CONTESTING RECORD PROCEDURES:
b. To an appeal, grievance, or formal made to such agencies, entities, and
complaints examiner; equal persons is reasonably necessary to assist Individuals may access their records,
employment opportunity investigator; in connection with GSA’s efforts to contest the contents, and appeal
arbitrator; or other official engaged in respond to the suspected or confirmed determinations according to their
investigating, or settling a grievance, compromise and prevent, minimize, or agency’s rules.
complaint, or appeal filed by an remedy such harm. RECORD SOURCE CATEGORIES:
individual who is the subject of the
POLICIES AND PRACTICES FOR STORING, Information is obtained from
record.
c. To officials of labor organizations RETRIEVING, ACCESSING, RETAINING, AND individuals submitting charge card
recognized under Public Law 95–454,
DISPOSING OF SYSTEM RECORDS: applications, monthly contractor
when necessary to their duties of STORAGE: reports, purchase records, managers,
exclusive representation on personnel other agencies, non-Federal sources
Information may be collected on
policies, practices, and matters affecting such as private firms, and other agency
paper or electronically and may be
working conditions. systems containing information
stored on paper or on electronic media,
d. To another Federal agency in pertaining to the purchase charge card
as appropriate.
connection with the hiring or retention program.
of an employee; the issuance of a RETRIEVABILITY:
[FR Doc. E8–8883 Filed 4–24–08; 8:45 am]
security clearance; the reporting of an Records may be retrieved by name, BILLING CODE 6820–34–P
investigation; clarifying a job; the letting Social Security Number, credit card
of a contract; or the issuance of a grant, number, and/or other personal identifier
license, or other benefit to the extent or appropriate type of designation. GENERAL SERVICES
that the information is relevant and SAFEGUARDS:
ADMINISTRATION
necessary to a decision.
e. To the Office of Personnel System records are safeguarded in Privacy Act of 1974; Notice of Updated
Management (OPM), the Office of accordance with the requirements of the Systems of Records
Management and Budget (OMB), the Privacy Act, the Computer Security Act,
and OMB Circular A–130. Technical, AGENCY: General Services
Government Accountability Office Administration.
(GAO) or other Federal agency when the administrative, and personnel security
measures are implemented to ensure ACTION: Notice.
information is required for program
evaluation purposes. confidentiality and integrity of the
system data stored, processed, and SUMMARY: GSA reviewed its Privacy Act
f. To a Member of Congress or staff on systems to ensure that they are relevant,
behalf of and at the request of the transmitted. Paper records are stored in
secure cabinets or rooms. Electronic necessary, accurate, up-to-date, covered
individual who is the subject of the by the appropriate legal or regulatory
record. records are protected by passwords and
other appropriate security measures. authority, and in response to OMB M–
g. To the National Archives and 07–16. This notice is a compilation of
Records Administration (NARA) for RETENTION AND DISPOSAL: updated Privacy Act system of record
records management purposes. notices.
h. To an expert, consultant, or Disposition of records is according to
contractor in the performance of a the National Archives and Records DATES: Effective May 27, 2008.
Federal duty to which the information Administration (NARA) guidelines, as FOR FURTHER INFORMATION CONTACT: Call
is relevant, including issuance of charge set forth in the handbook, GSA Records or e-mail the GSA Privacy Act Officer:
cards. Maintenance and Disposition System Telephone 202–208–1317; e-mail
i. To GSA in the form of listings, (OAD P 1820.2A and CIO P 1820.1), gsa.privacyact@gsa.gov.
reports, and records of all transportation authorized GSA records schedules, and
by individual agencies. ADDRESSES: GSA Privacy Act Officer
related transactions, including refunds (CIB), General Services Administration,
and adjustments, by the contractor to SYSTEM MANAGER AND ADDRESS: 1800 F Street, NW., Washington, DC
enable audits of transportation related Director, Office of Commercial 20405.
charges to the Government. Acquisition (FC), General Services
j. To GSA contract agents assigned to SUPPLEMENTARY INFORMATION: GSA
Administration, 1901 South Bell Street, undertook and completed an agency
participating agencies for billing of Arlington VA 22202. Also, officials
purchase expenses. wide review of its Privacy Act systems
responsible for individual agency of records. As a result of the review GSA
k. To agency finance offices for debt
purchase card programs using the is publishing updated Privacy Act
collection purposes.
l. To appropriate agencies, entities, SmartPay system. systems of records notices. Rather than
and persons when (1) the Agency NOTIFICATION PROCEDURE: make numerous piecemeal revisions,
suspects or has confirmed that the Individuals may obtain information GSA is republishing updated notices for
security or confidentiality of about their records from the purchase one of its systems. Nothing in the
information in the system of records has charge card program manager of the revised system notices indicates a
been compromised; (2) the Agency has change in authorities or practices
sroberts on PROD1PC70 with NOTICES

agency for which they transact


determined that as a result of the purchases. regarding the collection and
suspected or confirmed compromise maintenance of information. Nor do the
there is a risk of harm to economic or RECORD ACCESS PROCEDURES: changes impact individuals’ rights to
property interests, identity theft or Requests from individuals for access access or amend their records in the
fraud, or harm to the security or to their records should be addressed to systems of records. The updated system

VerDate Aug<31>2005 20:20 Apr 24, 2008 Jkt 214001 PO 00000 Frm 00057 Fmt 4703 Sfmt 4703 E:\FR\FM\25APN1.SGM 25APN1
22378 Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices

notices also include the new emergency response official status; law Federal facilities, systems, or
requirement from OMB Memorandum enforcement official status; results of information, and of facility occupants
M–07–16 regarding a new routine use background check; Government agency and users; to provide for interoperability
that allows agencies to disclose code; and PIV card issuance location. and trust in allowing physical access to
information in connection with a Records in the PIV IDMS needed for individuals entering Federal facilities;
response and remedial efforts in the credential management for enrolled and to allow logical access to Federal
event of a data breach. individuals in the PIV program include: information systems, networks, and
Dated: April 16, 2008. PIV card serial number; digital resources on a government-wide basis.
certificate(s) serial number; PIV card
Cheryl M. Paige, ROUTINE USES OF RECORDS MAINTAINED IN THE
issuance and expiration dates; PIV card
Director, Office of Information Management. SYSTEM INCLUDING CATEGORIES OF USERS AND
PIN; Cardholder Unique Identifier THE PURPOSES OF SUCH USES:
GSA/GOVT–7 (CHUID); and card management keys.
In addition to those disclosures
Agencies may also choose to collect the
SYSTEM NAME: generally permitted under 5 U.S.C.
following data at PIV enrollment which
Personal Identity Verification Identity Section 552a(b) of the Privacy Act, all or
would also be maintained in the PIV
Management System (PIV IDMS). a portion of the records or information
IDMS: Physical characteristics (e.g.,
contained in this system may be
SECURITY CLASSIFICATION:
height, weight, and eye and hair color).
disclosed outside GSA as a routine use
Individuals enrolled in the PIV managed
Sensitive but unclassified. pursuant to 5 U.S.C. 552a(b)(3) as
service will be issued a PIV card. The
follows:
SYSTEM LOCATION: PIV card contains the following a. To the Department of Justice (DOJ)
Records covered by this system are mandatory visual personally identifiable when: (1) The agency or any component
maintained by a contractor at the information: Name, photograph, thereof; or (2) any employee of the
contractor’s site. employee affiliation, organizational agency in his or her official capacity; (3)
affiliation, PIV card expiration date, any employee of the agency in his or her
CATEGORIES OF INDIVIDUALS COVERED BY THE
agency card serial number, and color- individual capacity where agency or the
SYSTEM:
coding for employee affiliation. Department of Justice has agreed to
The PIV IDMS records will cover all Agencies may choose to have the
participating agency employees, represent the employee; or (4) the
following optional personally United States Government is a party to
contractors and their employees, identifiable information printed on the
consultants, and volunteers who require litigation or has an interest in such
card: Cardholder physical litigation, and by careful review, the
routine, long-term access to federal characteristics (height, weight, and eye
facilities, information technology agency determines that the records are
and hair color). The card also contains both relevant and necessary to the
systems, and networks. The system also an integrated circuit chip which is
includes individuals authorized to litigation and the use of such records by
encoded with the following mandatory DOJ and is therefore deemed by the
perform or use services provided in data elements which comprise the
agency facilities (e.g., Credit Union, agency to be for a purpose compatible
standard data model for PIV logical with the purpose for which the agency
Fitness Center, etc.). credentials: PIV card PIN, cardholder
At their discretion, participating collected the records.
unique identifier (CHUID), PIV b. To a court or adjudicative body in
Federal agencies may include short-term authentication digital certificate, and
employees and contractors in the PIV a proceeding when: (1) The agency or
two fingerprint biometric templates. The any component thereof; (2) any
program and, therefore, inclusion in the PIV data model may be optionally
PIV IDMS. Federal agencies shall make employee of the agency in his or her
extended by agencies to include the official capacity; (3) any employee of the
risk-based decisions to determine following logical credentials: Digital
whether to issue PIV cards and require agency in his or her individual capacity
certificate for digital signature, digital where the agency or the Department of
prerequisite background checks for certificate for key management, card
short-term employees and contractors. Justice has agreed to represent the
authentication keys, and card employee; or (4) the United States
The system does not apply to occasional management system keys. All PIV
visitors or short-term guests. GSA and Government is a party to litigation or
logical credentials can only be read by has an interest in such litigation, and by
participating agencies will issue machine.
temporary identification and credentials careful review, the agency determines
for this purpose. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: that the records are both relevant and
5 U.S.C. 301; Federal Information necessary to the litigation and the use of
CATEGORIES OF RECORDS IN THE SYSTEM: such records and is therefore deemed by
Security Management Act (Pub. L. 107–
Enrollment records maintained in the 296, Sec. 3544); E-Government Act (Pub. the agency to be for a purpose that is
PIV IDMS on individuals applying for L. 107–347, Sec. 203); Paperwork compatible with the purpose for which
the PIV program and a PIV credential Reduction Act of 1995 (44 U.S.C. 3501 the agency collected the records.
through the GSA HSPD–12 managed et al.) and Government Paperwork c. Except as noted on Forms SF 85, SF
service include the following data Elimination Act (Pub. L. 105–277, 44 85–P, and SF 86, when a record on its
fields: Full name; Social Security U.S.C. 3504); Homeland Security face, or in conjunction with other
Number; Applicant ID number, date of Presidential Directive 12 (HSPD–12), records, indicates a violation or
birth; current address; digital color Policy for a Common Identification potential violation of law, whether civil,
photograph; fingerprints; biometric Standard for Federal Employees and criminal, or regulatory in nature, and
template (two fingerprints); Contractors, August 27, 2004; Federal whether arising by general statute or
organization/office of assignment; particular program statute, or by
sroberts on PROD1PC70 with NOTICES

Property and Administrative Services


employee affiliation; work e-mail Act of 1949, as amended. regulation, rule, or order issued
address; work telephone number(s); pursuant thereto, disclosure may be
office address; copies of identity source PURPOSES: made to the appropriate public
documents; employee status; military The primary purposes of the system authority, whether Federal, foreign,
status; foreign national status; federal are: To ensure the safety and security of State, local, or tribal, or otherwise,

VerDate Aug<31>2005 20:20 Apr 24, 2008 Jkt 214001 PO 00000 Frm 00058 Fmt 4703 Sfmt 4703 E:\FR\FM\25APN1.SGM 25APN1
Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices 22379

responsible for enforcing, investigating j. To designated agency personnel for Identification Number, Applicant ID,
or prosecuting such violation or charged controlled access to specific records for Social Security Number, and/or by any
with enforcing or implementing the the purposes of performing authorized other unique individual identifier.
statute, or rule, regulation, or order audit or authorized oversight and
SAFEGUARDS:
issued pursuant thereto, if the administrative functions. All access is
information disclosed is relevant to any controlled systematically through Consistent with the requirements of
enforcement, regulatory, investigative or authentication using PIV credentials the Federal Information Security
prosecutorial responsibility of the based on access and authorization rules Management Act (Pub. L. 107–296), and
receiving entity. for specific audit and administrative associated OMB policies, standards and
d. To a Member of Congress or to a functions. guidance from the National Institute of
Congressional staff member in response k. To the Office of Personnel Standards and Technology, and the
to an inquiry of the Congressional office Management (OPM), the Office of General Services Administration, the
made at the written request of the Management and Budget (OMB), the GSA HSPD–12 managed service office
constituent about whom the record is Government Accountability Office protects all records from unauthorized
maintained. (GAO), or other Federal agency in access through appropriate
e. To the National Archives and accordance with the agency’s administrative, physical, and technical
Records Administration (NARA) or to responsibility for evaluation of Federal safeguards. Access is restricted on a
the General Services Administration for personnel management. ‘‘need to know’’ basis, utilization of PIV
records management inspections l. To the Federal Bureau of Card access, secure VPN for Web access,
conducted under 44 U.S.C. 2904 and Investigation for the FBI National and locks on doors and approved
2906. Criminal History check. storage containers. Buildings have
f. To agency contractors, grantees, or m. To a Federal, State, or local security guards and secured doors. All
volunteers who have been engaged to agency, or other appropriate entities or entrances are monitored through
assist the agency in the performance of individuals, or through established electronic surveillance equipment. The
a contract service, grant, cooperative liaison channels to selected foreign hosting facility is supported by 24/7
agreement, or other activity related to governments, in order to enable an onsite hosting and network monitoring
this system of records and who need to intelligence agency to carry out its by trained technical staff. Physical
have access to the records in order to responsibilities under the National security controls include: Indoor and
perform their activity. Recipients shall Security Act of 1947 as amended; the outdoor security monitoring and
be required to comply with the CIA Act of 1949 as amended; Executive surveillance; badge and picture ID
requirements of the Privacy Act of 1974, Order 12333 or any successor order; and access screening; biometric access
as amended, 5 U.S.C. 552a, the Federal applicable national security directives, screening. Personally identifiable
Information Security Management Act or classified implementing procedures information is safeguarded and
(Pub. L. 107–296), and associated OMB approved by the Attorney General and protected in conformance with all
policies, standards and guidance from promulgated pursuant to such statutes, Federal statutory and OMB guidance
the National Institute of Standards and orders or directives. requirements. All access has role-based
Technology, and the General Services n. To appropriate agencies, entities, restrictions, and individuals with access
Administration. and persons when (1) the Agency privileges have undergone vetting and
g. To a Federal agency, State, local, suspects or has confirmed that the suitability screening. All data is
foreign, or tribal or other public security or confidentiality of encrypted in transit. While it is not
authority, on request, in connection information in the system of records has contemplated, any system records
with the hiring or retention of an been compromised; (2) the Agency has stored on mobile computers or mobile
employee, the issuance or retention of a determined that as a result of the devices will be encrypted. GSA
security clearance, the letting of a suspected or confirmed compromise maintains an audit trail and performs
contract, or the issuance or retention of there is a risk of harm to economic or random periodic reviews to identify
a license, grant, or other benefit, to the property interests, identity theft or unauthorized access. Persons given
extent that the information is relevant fraud, or harm to the security or roles in the PIV process must be
and necessary to the requesting agency’s integrity of this system or other systems approved by the Government and
decision. or programs (whether maintained by complete training specific to their roles
GSA or another agency or entity) that to ensure they are knowledgeable about
h. To the Office of Management and
rely upon the compromised how to protect personally identifiable
Budget (OMB) when necessary to the
information; and (3) the disclosure information.
review of private relief legislation
made to such agencies, entities, and
pursuant to OMB Circular No. A–19. RETENTION AND DISPOSAL:
persons is reasonably necessary to assist
i. To a Federal, State, or local agency, Disposition of records will be
in connection with GSA’s efforts to
or other appropriate entities or according to NARA disposition
respond to the suspected or confirmed
individuals, or through established authority N1–269–06–1 (pending).
compromise and prevent, minimize, or
liaison channels to selected foreign
remedy such harm.
governments, in order to enable an SYSTEM MANAGER AND ADDRESS:
intelligence agency to carry out its POLICIES AND PRACTICES FOR STORING, Director, HSPD–12 Managed Service
responsibilities under the National RETRIEVING, ACCESSING, RETAINING AND Office, Federal Acquisition Service
Security Act of 1947, as amended; the DISPOSING OF RECORDS IN THE SYSTEM:
(FAS), General Services Administration,
CIA Act of 1949, as amended; Executive STORAGE: Suite 911, 2011 Crystal Drive, Arlington,
Order 12333 or any successor order; and
sroberts on PROD1PC70 with NOTICES

Records are stored in electronic media VA 22202.


applicable national security directives, and in paper files.
or classified implementing procedures NOTIFICATION PROCEDURE:
approved by the Attorney General and RETRIEVABILITY: A request for access to records in this
promulgated pursuant to such statutes, Records may be retrieved by name of system may be made by writing to the
orders, or Directives. the individual, Cardholder Unique System Manager. When requesting

VerDate Aug<31>2005 20:20 Apr 24, 2008 Jkt 214001 PO 00000 Frm 00059 Fmt 4703 Sfmt 4703 E:\FR\FM\25APN1.SGM 25APN1
22380 Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices

notification of or access to records revised system notices indicates a b. Certificates issued.


covered by this Notice, an individual change in authorities or practices c. Certificates denied, suspended, and
should provide his/her full name, date regarding the collection and revoked, including reasons for denial,
of birth, agency name, and work maintenance of information. Nor do the suspension, and revocation.
location. An individual requesting changes impact individuals’ rights to d. A list of currently valid certificates.
notification of records in person must access or amend their records in the e. A list of currently invalid
provide identity documents sufficient to systems of records. The updated system certificates.
satisfy the custodian of the records that notices also includes the new f. A file of individuals requesting
the requester is entitled to access, such requirement from OMB Memorandum access and those granted access to ACES
as a government-issued photo ID. M–07–16 regarding a new routine use information under FOIA or the Privacy
that allows agencies to disclose Act.
RECORD ACCESS PROCEDURES:
information in connection with a g. A file of individuals requesting
Same as Notification Procedure above. response and remedial efforts in the access and those granted access for
CONTESTING RECORD PROCEDURES:
event of a data breach. reasons other than FOIA or the Privacy
Same as Notification Procedure above. Dated: April 16, 2008. Act.
State clearly and concisely the Cheryl M. Paige, h. A record of validation transactions
information being contested, the reasons Director, Office ofInformation Management. attempted on digital signature
for contesting it, and the proposed certificates issued by the system.
GSA/GOVT–5 i. A record of validation transactions
amendment to the information sought.
SYSTEM NAME:
completed on digital signature
RECORD SOURCE CATEGORIES: certificates issued by the system.
Access Certificates for Electronic
Employee, contractor, or applicant; Services (ACES). AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
sponsoring agency; former sponsoring
agency; other Federal agencies; contract SYSTEM LOCATION: Section 5124(b) of the Clinger-Cohen
employer; former employer. System records are maintained for the Act of 1996, 40 U.S.C. 1424, which
General Services Administration (GSA) provides authority for GSA to develop
EXEMPTIONS CLAIMED FOR THE SYSTEM: and facilitate governmentwide
by contractors at various physical
None. locations. A complete list of locations is electronic commerce resources and
[FR Doc. E8–8884 Filed 4–24–08; 8:45 am] available from: Administrative services, and the Paperwork Reduction
BILLING CODE 6820–34–P Contracting Officer, FEDCAC, Federal Act, 44 U.S.C. 3501, et. seq., which
Technology Service, General Services provides authority for GSA to manage
Administration, 7th and D Streets, SW., Federal information resources.
GENERAL SERVICES Room 5060, Washington, DC 20407; PURPOSE:
ADMINISTRATION telephone (202) 708–6099.
To establish and maintain an
Privacy Act of 1974; Notice of Updated CATEGORIES OF INDIVIDUALS COVERED BY THE electronic system to facilitate secure,
Systems of Records SYSTEM: on-line communication between Federal
Individuals covered are persons who automated information systems and the
AGENCY: General Services public, using digital signature
have applied for the issuance of a digital
Administration. technologies to authenticate and verify
signature certificate under the ACES
ACTION: Notice. program; have had their certificates identity.
SUMMARY: GSA reviewed its Privacy Act amended, renewed, replaced,
ROUTINE USES OF THE SYSTEM RECORDS,
systems to ensure that they are relevant, suspended, revoked, or denied; have
INCLUDING CATEGORIES OF USERS AND THEIR
necessary, accurate, up-to-date, covered used their certificates to electronically PURPOSES FOR USING THE SYSTEM:
by the appropriate legal or regulatory make contact with, retrieve information
from, or submit information to an Information from this system may be
authority, and in response to OMB M– disclosed as a routine use:
07–16. This notice is a compilation of automated information system of a
participating agency; have requested a. To GSA ACES program contractors
updated Privacy Act system of record to compile and maintain documentation
notices. access to ACES records under the
Freedom of Information Act (FOIA) or on applicants for proofing applicants’
DATES: Effective May 27, 2008. Privacy Act; and have corresponded identity and their authority to access
FOR FURTHER INFORMATION CONTACT: Call with GSA or its ACES contractors information system applications of
or e-mail the GSA Privacy Act Officer: concerning ACES services. participating agencies.
telephone 202–208–1317; e-mail b. To GSA ACES program contractors
gsa.privacyact@gsa.gov. CATEGORIES OF RECORDS IN THE SYSTEM: to establish and maintain
The system contains information documentation on information sources
ADDRESSES: GSA Privacy Act Officer needed to establish and verify the for verifying applicants’ identities.
(CIB), General Services Administration, identity of ACES users, to maintain the c. To Federal agencies participating in
1800 F Street NW., Washington, DC system, and to establish accountability the ACES program to determine the
20405. and audit controls. System records validity of applicants’ digital signature
SUPPLEMENTARY INFORMATION: GSA include: certificates in an on-line, near real time
undertook and completed an agency a. Applications for the issuance, environment.
wide review of its Privacy Act systems amendment, renewal, replacement, or d. To GSA, participating Federal
of records. As a result of the review GSA revocation of digital signature agencies, and ACES contractors, for
sroberts on PROD1PC70 with NOTICES

is publishing updated Privacy Act certificates under the ACES program, ensuring proper management, ensuring
systems of records notices. Rather than including evidence provided by data accuracy, and evaluation of the
make numerous piecemeal revisions, applicants or proof of identity and system.
GSA is republishing updated notices for authority, and sources used to verify an e. To Federal, State, local or foreign
one of its systems. Nothing in the applicant’s identify and authority. agencies responsible for investigating,

VerDate Aug<31>2005 21:24 Apr 24, 2008 Jkt 214001 PO 00000 Frm 00060 Fmt 4703 Sfmt 4703 E:\FR\FM\25APN1.SGM 25APN1

You might also like